Follow
Allison Beemer
Title
Cited by
Cited by
Year
A generalized algebraic approach to optimizing SC-LDPC codes
A Beemer, S Habib, CA Kelley, J Kliewer
2017 55th Annual Allerton Conference on Communication, Control, and …, 2017
262017
Avoiding trapping sets in SC-LDPC codes under windowed decoding
A Beemer, CA Kelley
2016 International Symposium on Information Theory and Its Applications …, 2016
182016
Explicit optimal-length locally repairable codes of distance 5
A Beemer, R Coatney, V Guruswami, HH López, F Pinero
2018 56th Annual Allerton Conference on Communication, Control, and …, 2018
172018
Belief propagation decoding of short graph-based channel codes via reinforcement learning
S Habib, A Beemer, J Kliewer
IEEE Journal on Selected Areas in Information Theory 2 (2), 627-640, 2021
132021
Learning to decode: Reinforcement learning for decoding of sparse graph-based channel codes
S Habib, A Beemer, J Kliewer
Advances in neural information processing systems 33, 22396-22406, 2020
112020
Authentication against a myopic adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
102019
Authentication and partial message correction over adversarial multiple-access channels
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
92020
Structured coding for authentication in the presence of a malicious adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019
82019
Learned scheduling of LDPC decoders based on multi-armed bandits
S Habib, A Beemer, J Kliewer
2020 IEEE International Symposium on Information Theory (ISIT), 2789-2794, 2020
72020
Network decoding
A Beemer, AB Kılıç, A Ravagnani
IEEE Transactions on Information Theory 69 (6), 3708-3730, 2023
62023
Authentication with mildly myopic adversaries
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE International Symposium on Information Theory (ISIT), 984-989, 2020
52020
Reldec: Reinforcement learning-based decoding of moderate length ldpc codes
S Habib, A Beemer, J Kliewer
IEEE Transactions on Communications, 2023
42023
Network decoding against restricted adversaries
A Beemer, AB Kılıç, A Ravagnani
IFAC-PapersOnLine 55 (30), 236-241, 2022
42022
Analysis of absorbing sets using cosets and syndromes
E McMillon, A Beemer, CA Kelley
2020 IEEE International Symposium on Information Theory (ISIT), 367-372, 2020
42020
Design and analysis of graph-based codes using algebraic lifts and decoding networks
A Beemer
The University of Nebraska-Lincoln, 2018
42018
Graph-based codes for hierarchical recovery
A Beemer, R Kshirsagar, GL Matthews
2022 IEEE International Symposium on Information Theory (ISIT), 1554-1559, 2022
32022
The curious case of the diamond network
A Beemer, A Ravagnani
arXiv preprint arXiv:2107.02144, 2021
32021
Absorbing sets of codes from finite geometries
A Beemer, K Haymaker, CA Kelley
Cryptography and Communications 11, 1115-1131, 2019
32019
Extremal absorbing sets in low-density parity-check codes
E McMillon, A Beemer, CA Kelley
22023
Keyless authentication for awgn channels
E Graves, A Beemer, J Kliewer, O Kosut, LY Paul
IEEE Transactions on Information Theory 69 (1), 496-519, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20